Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2857546.2857623acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Context Information-based Application Access Control Model

Published: 04 January 2016 Publication History

Abstract

Access control has long been a central topic in software security. Having proposed a number of different control mechanisms, including MAC, DAC, and RBAC, researchers are now introducing control models that make use of new context information, such as time, and location. Unfortunately, because these have been based on existing security paradigms, their use of context is often unintuitive, and insufficiently separated from business and processing logic. This paper proposes a new model for access control called CIAAC (Context Information-based Application Access Control). CIAAC is specifically designed to separate context awareness and access control policies from business and processing logic, allowing operators of business applications to change access control policies more freely in response to the external security environment.

References

[1]
Dey, A. K. 2001. Understanding and using context. 2001. Personal and Ubiquitous Computing, 5, 1 (Feb. 2001), 4--7.
[2]
Kizza, J. M. 2013. A guide to computer network security. Springer-Verlag.
[3]
Kim, K., Ko, H., and Hwang, H. 2007. Context RBAC/MAC access control for ubiquitous environment. Lecture Notes in Computer Science, 4443 (Apr. 2007), 1075--1085.
[4]
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Computer, 29, 2 (Feb. 1996), 38--47.
[5]
Covington, M. J., Moyer, M. J., and Ahamad, M. 2000. Generalized role-based access control for securing future applications. In Proceedings of the 23rd National Information Systems Security Conference (Baltimore, Maryland, October 16-19, 2000). NISSC '00, 40--51
[6]
Park, S.-H., Han, Y.-J., and Chung, T.-M. 2006. Context-role based access control for context-aware application. Lecture Notes in Computer Science, 4208 (Sep. 2006), 572--580.
[7]
Kim, Y.-G, Moon, C.-J. Jeong, D., Lee, J.-O., Song, C.-Y., and Baik, D.-K. 2005. Context-aware access control mechanism for ubiquitous applications. Lecture Notes in Artificial Intelligence, 3528 (Jun. 2005), 236--242.
[8]
Kim, Y. -G., and Cha, S. 2013. Dynamic access control policy based on RBAC for ubiquitous applications. Information-An International Interdisciplinary Journal, 16, 9(B) (Sep. 2013). 7175-7190.

Cited By

View all
  • (2021)An Intelligent Access Control ModelQuality Control - Intelligent Manufacturing, Robust Design and Charts10.5772/intechopen.95459Online publication date: 24-Mar-2021
  • (2019)An Introspective Study on Dynamic Role-Centric RBAC Models2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)10.1109/ICSCAN.2019.8878827(1-6)Online publication date: Mar-2019

Index Terms

  1. Context Information-based Application Access Control Model

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication
    January 2016
    658 pages
    ISBN:9781450341424
    DOI:10.1145/2857546
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 January 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Access Control
    2. Business Logic
    3. Context-Aware

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    IMCOM '16
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 213 of 621 submissions, 34%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)An Intelligent Access Control ModelQuality Control - Intelligent Manufacturing, Robust Design and Charts10.5772/intechopen.95459Online publication date: 24-Mar-2021
    • (2019)An Introspective Study on Dynamic Role-Centric RBAC Models2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)10.1109/ICSCAN.2019.8878827(1-6)Online publication date: Mar-2019

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media